mirror of
https://github.com/minio/minio.git
synced 2024-12-25 22:55:54 -05:00
05685863e3
When configuring a new target, such as an audit target, the server waits until all audit events are sent to the audit target before doing the swap from the old to the new audit target. Therefore current S3 operations can suffer from this since the audit swap lock will be held. This behavior is unnecessary as the new audit target can enter in a functional mode immediately and the old audit will just cancel itself at its own pace.
200 lines
5.0 KiB
Go
200 lines
5.0 KiB
Go
// Copyright (c) 2015-2022 MinIO, Inc.
|
|
//
|
|
// This file is part of MinIO Object Storage stack
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package logger
|
|
|
|
import (
|
|
"sync"
|
|
|
|
"github.com/minio/minio/internal/logger/target/http"
|
|
"github.com/minio/minio/internal/logger/target/kafka"
|
|
"github.com/minio/minio/internal/logger/target/types"
|
|
)
|
|
|
|
// Target is the entity that we will receive
|
|
// a single log entry and Send it to the log target
|
|
// e.g. Send the log to a http server
|
|
type Target interface {
|
|
String() string
|
|
Endpoint() string
|
|
Init() error
|
|
Cancel()
|
|
Send(entry interface{}, errKind string) error
|
|
Type() types.TargetType
|
|
}
|
|
|
|
var (
|
|
swapAuditMuRW sync.RWMutex
|
|
swapSystemMuRW sync.RWMutex
|
|
|
|
// systemTargets is the set of enabled loggers.
|
|
// Must be immutable at all times.
|
|
// Can be swapped to another while holding swapMu
|
|
systemTargets = []Target{}
|
|
|
|
// This is always set represent /dev/console target
|
|
consoleTgt Target
|
|
)
|
|
|
|
// SystemTargets returns active targets.
|
|
// Returned slice may not be modified in any way.
|
|
func SystemTargets() []Target {
|
|
swapSystemMuRW.RLock()
|
|
defer swapSystemMuRW.RUnlock()
|
|
|
|
res := systemTargets
|
|
return res
|
|
}
|
|
|
|
// AuditTargets returns active audit targets.
|
|
// Returned slice may not be modified in any way.
|
|
func AuditTargets() []Target {
|
|
swapAuditMuRW.RLock()
|
|
defer swapAuditMuRW.RUnlock()
|
|
|
|
res := auditTargets
|
|
return res
|
|
}
|
|
|
|
// auditTargets is the list of enabled audit loggers
|
|
// Must be immutable at all times.
|
|
// Can be swapped to another while holding swapMu
|
|
var (
|
|
auditTargets = []Target{}
|
|
)
|
|
|
|
// AddSystemTarget adds a new logger target to the
|
|
// list of enabled loggers
|
|
func AddSystemTarget(t Target) error {
|
|
if err := t.Init(); err != nil {
|
|
return err
|
|
}
|
|
|
|
swapSystemMuRW.Lock()
|
|
defer swapSystemMuRW.Unlock()
|
|
|
|
if consoleTgt == nil {
|
|
if t.Type() == types.TargetConsole {
|
|
consoleTgt = t
|
|
}
|
|
}
|
|
updated := append(make([]Target, 0, len(systemTargets)+1), systemTargets...)
|
|
updated = append(updated, t)
|
|
systemTargets = updated
|
|
|
|
return nil
|
|
}
|
|
|
|
func initSystemTargets(cfgMap map[string]http.Config) (tgts []Target, err error) {
|
|
for _, l := range cfgMap {
|
|
if l.Enabled {
|
|
t := http.New(l)
|
|
if err = t.Init(); err != nil {
|
|
return tgts, err
|
|
}
|
|
tgts = append(tgts, t)
|
|
}
|
|
}
|
|
return tgts, err
|
|
}
|
|
|
|
func initKafkaTargets(cfgMap map[string]kafka.Config) (tgts []Target, err error) {
|
|
for _, l := range cfgMap {
|
|
if l.Enabled {
|
|
t := kafka.New(l)
|
|
if err = t.Init(); err != nil {
|
|
return tgts, err
|
|
}
|
|
tgts = append(tgts, t)
|
|
}
|
|
}
|
|
return tgts, err
|
|
}
|
|
|
|
// Split targets into two groups:
|
|
// group1 contains all targets of type t
|
|
// group2 contains the remaining targets
|
|
func splitTargets(targets []Target, t types.TargetType) (group1 []Target, group2 []Target) {
|
|
for _, target := range targets {
|
|
if target.Type() == t {
|
|
group1 = append(group1, target)
|
|
} else {
|
|
group2 = append(group2, target)
|
|
}
|
|
}
|
|
return
|
|
}
|
|
|
|
func cancelTargets(targets []Target) {
|
|
for _, target := range targets {
|
|
target.Cancel()
|
|
}
|
|
}
|
|
|
|
// UpdateSystemTargets swaps targets with newly loaded ones from the cfg
|
|
func UpdateSystemTargets(cfg Config) error {
|
|
newTgts, err := initSystemTargets(cfg.HTTP)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
swapSystemMuRW.Lock()
|
|
consoleTargets, otherTargets := splitTargets(systemTargets, types.TargetConsole)
|
|
newTgts = append(newTgts, consoleTargets...)
|
|
systemTargets = newTgts
|
|
swapSystemMuRW.Unlock()
|
|
|
|
cancelTargets(otherTargets) // cancel running targets
|
|
return nil
|
|
}
|
|
|
|
// UpdateAuditWebhookTargets swaps audit webhook targets with newly loaded ones from the cfg
|
|
func UpdateAuditWebhookTargets(cfg Config) error {
|
|
newWebhookTgts, err := initSystemTargets(cfg.AuditWebhook)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
swapAuditMuRW.Lock()
|
|
// Retain kafka targets
|
|
oldWebhookTgts, otherTgts := splitTargets(auditTargets, types.TargetHTTP)
|
|
newWebhookTgts = append(newWebhookTgts, otherTgts...)
|
|
auditTargets = newWebhookTgts
|
|
swapAuditMuRW.Unlock()
|
|
|
|
cancelTargets(oldWebhookTgts) // cancel running targets
|
|
return nil
|
|
}
|
|
|
|
// UpdateAuditKafkaTargets swaps audit kafka targets with newly loaded ones from the cfg
|
|
func UpdateAuditKafkaTargets(cfg Config) error {
|
|
newKafkaTgts, err := initKafkaTargets(cfg.AuditKafka)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
swapAuditMuRW.Lock()
|
|
// Retain webhook targets
|
|
oldKafkaTgts, otherTgts := splitTargets(auditTargets, types.TargetKafka)
|
|
newKafkaTgts = append(newKafkaTgts, otherTgts...)
|
|
auditTargets = newKafkaTgts
|
|
swapAuditMuRW.Unlock()
|
|
|
|
cancelTargets(oldKafkaTgts) // cancel running targets
|
|
return nil
|
|
}
|